Nine Instant Messaging Best Practices - Slide 9

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Nine Instant Messaging Best Practices-9 Next

When chatting in IM, return your reply in a timely fashion. Try to respond to the other person within a few minutes and generally not longer than five minutes. If you are going to be away from your computer but wish to continue your IM exchange, tell the other person you will BRB (be right back).

Could it be the “instant” in instant messaging that makes this form of online chat so appealing? It isn’t used in every office, but it is becoming more common as a business communication tool. One of the reasons its popularity is growing is because it allows you to send and receive messages so quickly. But before sending your next IM, Robert Half Technology suggests that you follow these etiquette rules.

More Slideshows:


Top Outsourcing Trends for Q2 2011The latest outsourcing trends identified by the Everest Group.

Significant Increase in Malware Attacks on Mobile Platforms Seen in Q2 2011Report shows record growth for malware and rootkits; major hacktivist activity.

Five Mistakes Companies Make in Their Cloud StrategiesLearn how to capture the full potential of the cloud.

 

Related Topics : Call Centers, Service Level Agreements

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.